ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30...
-
Upload
gregory-owen -
Category
Documents
-
view
216 -
download
2
Transcript of ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30...
![Page 1: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/1.jpg)
BB30 Business Law 6.03Summer 2013
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Objective 6.03 Understand cyber law
![Page 2: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/2.jpg)
BB30 Business Law 6.03Summer 2013
Cyber law
Cyberlaw - Law that pertains to computer and computer-related crimes Cybercrime – any criminal activity associated with
a computer Cybertort – invasion, theft, falsification, misuse or
deletion of information stored in a computer
![Page 3: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/3.jpg)
BB30 Business Law 6.03Summer 2013
Cybercrime
Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud
Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format
Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer
Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure
Cybervandalism – disrupting, damaging, or destroying a website or computer network
Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files
![Page 4: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/4.jpg)
Identity Theft
BB30 Business Law 6.03Summer 2013
Identity theft – using a computer to steal financial, employment, education, medical and personal data
How to report Other types
Medical Identity Child Identity
![Page 5: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/5.jpg)
BB30 Business Law 6.03Summer 2013
Cybertorts
Invasion, theft, falsification, misuse, or deletion of information stored in a computer Cyberdefamation – communication via computer
or other electronic device of false information that damages a person’s reputation
Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer
![Page 6: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/6.jpg)
BB30 Business Law 6.03Summer 2013
Important Statutes Computer Software Copyright Act of 1980
added software programs to the types of work protected by copyright laws
Anticybersquatting Consumer Protection Act provides a shield for real owners of trademarks and trade names.
Prevents people to trademark a domain name with no intention of using it
Uniform Computer Information Transactions Act (UCITA) Governs law for software agreements, licenses, formulation
contracts, and maintenance contracts Contracts entered into electronically will be just as binding as one
negotiated outside of the Web.
![Page 7: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/7.jpg)
BB30 Business Law 6.03Summer 2013
Important Statutes
Lanham Act of 1976 Provides for the registration and protection of copyrights and
trademarks
Trademark Dilution Act of 1996 Attempts to protect the holders of famous trademarks from the
effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill
Computer Fraud and Abuse Act An often-amended act that pioneered the treatment of computer-
related crimes as unique offenses
![Page 8: ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.](https://reader036.fdocuments.us/reader036/viewer/2022082709/56649cc55503460f9498f2a3/html5/thumbnails/8.jpg)
BB30 Business Law 6.03Summer 2013
Important Statutes
Telecommunications Act of 1996 Also known as the Communications Decency Act of 1996 Makes it criminal to knowingly transport obscene material through
interactive computers or interstate or foreign commerce for sale or distribution
Gives protection from defamation suits to Internet service providers
Child Online Protection Act of 1998 Makes it a crime for site operators to fail to use proper technology
to prevent minors from accessing harmful material